Healthcare Information Technology (HIT) is one of the largest industrial segments, second to defense, that relies on advanced technologies. The varieties of systems that are interconnected utilize a variety of security protocols, transports and approaches thereby making them vulnerable. As an industry there are few if any security requirements for healthcare institutions and although government regulations focus on privacy, the only requirement is basic cryptography and O/S security.
This discussion will discuss the overall structure of HIT technology, potential weak points vulnerable to attack and common attack patterns. The goal of the discussion is to highlight the weakness by HIT in hopes of creating a more secure HIT infrastructure.